summaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel/cpu/bugs.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* x86/bugs: Add AMD retbleed= boot parameterAlexandre Chartre2022-06-271-1/+107
* x86/bugs: Report AMD retbleed vulnerabilityAlexandre Chartre2022-06-271-0/+13
* Merge tag 'x86-bugs-2022-06-01' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2022-06-141-36/+199
|\
| * x86/speculation/mmio: Print SMT warningJosh Poimboeuf2022-06-011-0/+11
| * x86/speculation/srbds: Update SRBDS mitigation selectionPawan Gupta2022-05-211-3/+5
| * x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale DataPawan Gupta2022-05-211-0/+22
| * x86/speculation/mmio: Enable CPU Fill buffer clearing on idlePawan Gupta2022-05-211-2/+14
| * x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigationsPawan Gupta2022-05-211-10/+16
| * x86/speculation/mmio: Add mitigation for Processor MMIO Stale DataPawan Gupta2022-05-211-4/+107
| * x86/speculation: Add a common function for MD_CLEAR mitigation updatePawan Gupta2022-05-211-26/+33
* | x86/speculation/srbds: Do not try to turn mitigation off when not supportedRicardo CaƱuelo2022-04-051-0/+7
|/
* x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMTJosh Poimboeuf2022-03-051-2/+25
* x86/speculation: Warn about Spectre v2 LFENCE mitigationJosh Poimboeuf2022-03-051-0/+5
* x86/speculation: Use generic retpoline by default on AMDKim Phillips2022-02-281-9/+0
* x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation re...Josh Poimboeuf2022-02-211-6/+29
* x86/speculation: Add eIBRS + Retpoline optionsPeter Zijlstra2022-02-211-37/+96
* x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCEPeter Zijlstra (Intel)2022-02-211-11/+18
* Merge tag 'seccomp-v5.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2021-11-021-2/+2
|\
| * x86: change default to spec_store_bypass_disable=prctl spectre_v2_user=prctlAndrea Arcangeli2021-10-041-2/+2
* | Merge tag 'x86-fpu-2021-11-01' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2021-11-011-1/+1
|\ \
| * | x86/fpu: Replace the includes of fpu/internal.hThomas Gleixner2021-10-201-1/+1
| |/
* / x86,bugs: Unconditionally allow spectre_v2=retpoline,amdPeter Zijlstra2021-10-281-7/+0
|/
* x86, prctl: Hook L1D flushing in via prctlBalbir Singh2021-07-281-0/+33
* x86/mm: Prepare for opt-in based L1D flush in switch_mm()Balbir Singh2021-07-281-0/+37
* x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpbAnand K Mistry2020-11-251-2/+2
* x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-o...Anand K Mistry2020-11-051-18/+33
* x86/bugs/multihit: Fix mitigation reporting when VMX is not in usePawan Gupta2020-08-071-1/+7
* Merge tag 'x86-fsgsbase-2020-08-04' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2020-08-051-4/+2
|\
| * x86/speculation/swapgs: Check FSGSBASE in enabling SWAPGS mitigationTony Luck2020-06-181-4/+2
* | x86/speculation: Merge one test in spectre_v2_user_select_mitigation()Borislav Petkov2020-06-161-9/+4
|/
* Merge tag 'x86-urgent-2020-06-11' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2020-06-121-38/+54
|\
| * x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.Anthony Steinhauser2020-06-091-2/+5
| * x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.Anthony Steinhauser2020-06-091-37/+50
* | Merge branch 'akpm' (patches from Andrew)Linus Torvalds2020-06-091-1/+1
|\ \
| * | mm: reorder includes after introduction of linux/pgtable.hMike Rapoport2020-06-091-1/+1
| * | mm: introduce include/linux/pgtable.hMike Rapoport2020-06-091-1/+1
| |/
* / x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigationMark Gross2020-04-201-0/+106
|/
* x86/bugs: Move enum taa_mitigations to bugs.cBorislav Petkov2019-12-141-0/+7
* x86/speculation: Fix redundant MDS mitigation messageWaiman Long2019-11-161-0/+13
* x86/speculation: Fix incorrect MDS/TAA mitigation statusWaiman Long2019-11-161-2/+15
* x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUsJosh Poimboeuf2019-11-071-4/+0
* kvm: mmu: ITLB_MULTIHIT mitigationPaolo Bonzini2019-11-041-1/+12
* x86/bugs: Add ITLB_MULTIHIT bug infrastructureVineela Tummalapalli2019-11-041-0/+13
* x86/speculation/taa: Add sysfs reporting for TSX Async AbortPawan Gupta2019-10-281-0/+23
* x86/speculation/taa: Add mitigation for TSX Async AbortPawan Gupta2019-10-281-0/+108
* Merge branch 'x86-apic-for-linus' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2019-09-171-1/+1
|\
| * x86/cpu: Move arch_smt_update() to a neutral placeThomas Gleixner2019-07-251-1/+1
* | x86/intel: Aggregate big core graphics namingPeter Zijlstra2019-08-281-2/+2
* | x86/intel: Aggregate big core mobile namingPeter Zijlstra2019-08-281-3/+3
* | x86/intel: Aggregate big core client namingPeter Zijlstra2019-08-281-4/+4